Progress in Cryptology AFRICACRYPT 2010

Progress in Cryptology   AFRICACRYPT 2010

This book constitutes the proceedings of the Third International Conference on Cryptology in Africa, AFRICACRYPT 2010, held in Stellenbosch, South Africa, on May 3-6, 2010.

Author: Daniel J. Bernstein

Publisher: Springer

ISBN: 9783642126789

Category: Computers

Page: 437

View: 707

This book constitutes the proceedings of the Third International Conference on Cryptology in Africa, AFRICACRYPT 2010, held in Stellenbosch, South Africa, on May 3-6, 2010. The 25 papers presented together with three invited talks were carefully reviewed and selected from 82 submissions. The topics covered are signatures, attacks, protocols, networks, elliptic curves, side-channel attacks and fault attacks, public-key encryption, keys and PUFs, and ciphers and hash functions.
Categories: Computers

Progress in Cryptology INDOCRYPT 2010

Progress in Cryptology   INDOCRYPT 2010

11th International Conference on Cryptology in India, Hyderabad, India,
December 12-15, 2010, Proceedings Guang Gong, Kishan Chand Gupta ...
Cryptology ePrint Archive, Report ... Progress in CryptologyAFRICACRYPT
2010. LNCS ...

Author: Guang Gong

Publisher: Springer

ISBN: 9783642174018

Category: Computers

Page: 366

View: 158

This book constitutes the refereed proceedings of the 11th International Conference on Cryptology in India, INDOCRYPT 2010, held in Hyderabad, India, in December 2010. The 22 revised full papers were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on security of RSA and multivariate schemes; security analysis, pseudorandom permutations and applications; hash functions; attacks on block ciphers and stream ciphers; fast cryptographic computation; cryptanalysis of AES; and efficient implementation.
Categories: Computers

Progress in Cryptology AFRICACRYPT 2019

Progress in Cryptology     AFRICACRYPT 2019

371–387 (2013). https://doi.org/10.1007/978-3-642-38348-9 23 7. Dunkelman, O.
, Keller, N., Shamir, A.: Improved single-key attacks on 8-round AES-192 and
AES-256. In: Advances in Cryptology - ASIACRYPT 2010–16th International ...

Author: Johannes Buchmann

Publisher: Springer

ISBN: 9783030236960

Category: Computers

Page: 449

View: 454

This book constitutes the refereed proceedings of the 11th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2019, held in Rabat, Morocco, in July 2019. The 22 papers presented in this book were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections on protocols; post-quantum cryptography; zero-knowledge; lattice based cryptography; new schemes and analysis; block ciphers; side-channel attacks and countermeasures; signatures. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR).
Categories: Computers

Progress in Cryptology AFRICACRYPT 2020

Progress in Cryptology   AFRICACRYPT 2020

Stehlé, D., Steinfeld, R.: Faster fully homomorphic encryption. In: Abe, M. (ed.)
ASIACRYPT 2010. LNCS, vol. 6477, pp. 377–394. Springer, Heidelberg (2010).
https://doi.org/10.1007/978-3-642-17373-8 22 21. van Dijk, M., Gentry, C., Halevi,
S.

Author: Abderrahmane Nitaj

Publisher: Springer Nature

ISBN: 9783030519384

Category:

Page:

View: 138

Categories:

Progress in Cryptology AFRICACRYPT 2012

Progress in Cryptology    AFRICACRYPT 2012

5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12,
2012, Proceedings Aikaterini ... CRYPTO 2010. LNCS, vol. 6223, pp. 370–392.
Springer, Heidelberg (2010) Sasaki, Y., Li, Y., Wang, L., Sakiyama, K., Ohta, ...

Author: Aikaterini Mitrokotsa

Publisher: Springer

ISBN: 9783642314100

Category: Computers

Page: 424

View: 163

This book constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012. The 24 papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 56 submissions. They are organized in topical sections on signature schemes, stream ciphers, applications of information theory, block ciphers, network security protocols, public-key cryptography, cryptanalysis of hash functions, hash functions: design and implementation, algorithms for public-key cryptography, and cryptographic protocols.
Categories: Computers

Progress in Cryptology AFRICACRYPT 2011

Progress in Cryptology    AFRICACRYPT 2011

This book constitutes the refereed proceedings of the 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Dakar, Senegal, in July 2011.

Author: Abderrahmane Nitaj

Publisher: Springer Science & Business Media

ISBN: 9783642219689

Category: Business & Economics

Page: 387

View: 412

This book constitutes the refereed proceedings of the 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Dakar, Senegal, in July 2011. The 23 papers presented together with abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions. They are organized in topical sections on protocols, cryptanalysis, secret-key cryptography, efficient implementations, cryptographic schemes, algorithmic problems, elliptic curves, fault analysis, and security proofs.
Categories: Business & Economics

Progress in Cryptology AFRICACRYPT 2013

Progress in Cryptology    AFRICACRYPT 2013

6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24,
2013, Proceedings Amr Youssef, ... In 2010, Micciancio and Voulgaris presented
two variants of this sieving algorithm that still require exponential storage, but
with ...

Author: Amr Youssef

Publisher: Springer

ISBN: 9783642385537

Category: Computers

Page: 453

View: 151

This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2013, held in Cairo, Egypt, in June 2013. The 26 papers presented were carefully reviewed and selected from 77 submissions. They cover the following topics: secret-key and public-key cryptography and cryptanalysis, efficient implementation, cryptographic protocols, design of cryptographic schemes, security proofs, foundations and complexity theory, information theory, multi-party computation, elliptic curves, and lattices.
Categories: Computers

Post Quantum Cryptography

Post Quantum Cryptography

Deep Space Network Progress Report 44, 114–116 (1978) 2. Berger, T.P.,
Cayrel, P.-L., Gaborit, P., Otmani, A.: Reducing key length of the McEliece
cryptosystem. In: Preneel, B. (ed.) AFRICACRYPT 2009. ... Springer, Heidelberg (
2010) 5.

Author: Michele Mosca

Publisher: Springer

ISBN: 9783319116594

Category: Computers

Page: 284

View: 576

This book constitutes the refereed proceedings of the 6th International Workshop on Post-Quantum Cryptography, PQCrypto 2014, held in Waterloo, ON, Canada, in October 2014. The 16 revised full papers presented were carefully reviewed and selected from 37 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, isogeny-based cryptography, security proof frameworks, cryptanalysis and implementations.
Categories: Computers